XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

XFER is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 734-927-6666 / 800-Get-XFER.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, August 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Hosted Solutions Google Hackers Productivity Data Mobile Office Hardware Mobile Devices VoIP Gadgets Quick Tips Email Malware IT Support Network Efficiency Social Media Business Management Innovation IT Services Network Security Miscellaneous Business Continuity Smartphones Server Business Virtualization Upgrade Windows Disaster Recovery Communication Microsoft Office Managed IT Services Computer Users Communications Mobile Device Management User Tips Passwords Data Backup Android Browser Marketing Smartphone Alert WiFi Holiday Save Money Vendor Management Data Recovery Cybercrime Operating System Remote Monitoring Windows 10 Outsourced IT Mobile Computing Ransomware Tech Term Information Technology Internet of Things Cloud Computing Avoiding Downtime BDR Bring Your Own Device Apple Computers BYOD Automation Big Data Remote Computing VPN IT Solutions The Internet of Things Telephone Systems Router Current Events Going Green Chrome Best Practice History Cybersecurity Social Engineering Employer-Employee Relationship Facebook Trending Firewall Phone System Artificial Intelligence Wireless Technology Application IT Consultant Health Collaboration Hacking Spam Bandwidth Excel App Printer Office Lithium-ion Battery Budget Money Managed IT Services Proactive IT Business Intelligence How To Networking iPhone Two-factor Authentication Mobility Business Managament Content Filtering Fax Server Recovery Maintenance Windows 8 Website PowerPoint Unified Threat Management Antivirus Data Security Gmail Analytics Managed IT User Error Customer Relationship Management Humor Hard Drives Phishing Outlook Mouse Tutorials Virus Private Cloud Value Redundancy Law Enforcement Office 365 Data Protection Applications Apps Word Tech Support Office Tips Saving Time Identity Theft Google Drive Compliance Flexibility Productivity Downtime Entertainment File Sharing Memory IT Management Windows 10 Retail Conferencing Analysis Inbound Marketing IT Support Tablet Vulnerability Network Congestion Sports Data Management Search Administration Twitter Connectivity Mobile Device Document Management Digital Payment Streaming Media Risk Management Social Networking Save Time Computer Repair Blockchain Wireless Physical Security Cleaning Password Workers Comparison Skype Programming Public Cloud Windows 7 IBM SaaS Scam Piracy Leadership Running Cable Data loss Administrator Augmented Reality Intranet Access Control Data storage Wearable Technology Smart Tech Spam Blocking Computer Accessories Credit Cards eWaste Machine Learning Instant Messaging Internet Exlporer Settings Training Best Available Environment PDF Information Safety Wi-Fi Servers Human Resources Social Bluetooth HaaS End of Support People Government Biometrics CES YouTube IT Plan IT service Meetings Samsung Paperless Office OneNote Touchscreen Hacker Webinar DDoS Data Storage Content Management Online Currency Unsupported Software Point of Sale Infrastructure Recycling Solid State Drive Black Market Encryption Education Work/Life Balance Data Breach USB Statistics Update Robot Video Surveillance Software Tips Remote Work nternet Crowdfunding Healthcare Root Cause Analysis Entrepreneur Password Manager Remote Support Inventory Remote Monitoring and Maintenance Wireless Internet Computer Fan Telephony Tablets Webcam Unified Communications Notifications IoT Telephone System Supercomputer Company Culture Laptop Thought Leadership Hiring/Firing Online Shopping Law Firm IT Colocation NIST Windows Media Player Google Docs Virtual Desktop Staff SharePoint Electronic Health Records Botnet Cost Management Business Mangement Shadow IT Line of Business Macro Data Warehousing Specifications PC Care LinkedIn Wire FENG Upgrades Start Menu Analyitcs Theft Hybrid Cloud Co-managed IT Knowledge Net Neutrality Touchpad Content Filter Patch Management Regulations Scheduling Evernote IaaS Computing Infrastructure Cryptocurrency Voice over Internet Protocol Customer Service 3D Digital Signature HBO Consultant Relocation Screen Mirroring Travel Criminal eBay Windows 8.1 Update Authentication 360 Legal MSP Emails Millennials Alerts Monitor Smart Office Electronic Medical Records Mobile Cortana Display Insurance Storage Windows 10s Wireless Charging Debate Business Owner Safe Mode Cameras Multi-Factor Security Strategy Licensing Frequently Asked Questions Fraud HVAC Charger Cast Text Messaging Nanotechnology WIndows 7 Workforce Work Station Reputation Hiring/Firing Professional Services Virtual Reality Gaming Console Google Apps Practices HIPAA Managed Service Addiction Flash Fiber-Optic Accountants Internet exploMicrosoft Business Technology Printer Server Lifestyle Shortcut Hosted Solution Tip of the week User Amazon Enterprise Content Management Computer Care Worker Commute Software as a Service NarrowBand Managing Stress Telecommuting Domains Customers Students Help Desk Tools Bloatware Uninterrupted Power Supply Hosted Computing Keyboard Proactive Cache Audit Sync Science Cables IT Security Advertising Virtual Assistant Chromecast Devices Netflix Windows Server 2008 Amazon Web Services Print Server Distributed Denial of Service Files Password Management Experience Congratulations Two Factor Authentication Content Emergency How to Worker Music Techology Audiobook Regulation Assessment Rootkit Politics Transportation Television Troubleshooting Remote Worker Webinar Benefits Battery Automobile Public Computer Video Games Wiring IT solutions Employer Employee Relationship CrashOverride Thank You Smart Technology Books Scalability Loyalty

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *